Jabzy
Why did Japanese Buddhists want to Kill Charlie Chaplin | Japan in WW2, Japanese Nationalism
Why did Japanese Buddhists want to Kill Charlie Chaplin | Japan in WW2, Japanese Nationalism
Hip Hughes History
The Decision to Drop the Atomic Bomb on Hiroshima and Nagasaki
The decision to drop the Atomic bomb in Japan to end WWII are controversial to this day. Explore the decision that Harry Truman had to make and then make up your own mind.
Curated Video
This is Me Part 2: The Impact of Alienation and Exclusion
In this episode of In Control, Jeff explores the theme of alienation and its detrimental effects on individuals. He starts by referencing movies where characters feel like they don't fit in and highlights the hurtful nature of alienating...
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
DNS Poisoning Attack
In this video, you will use KALI to learn how to cache poison the DNS (Domain Name Server) entries to redirect the requester to a different page.
Curated Video
No Password !! No Issue, You Can Still Hack
No Password !! No Issue, You Can Still Hack
Curated Video
Collect and Visualize Data with Maltego
This video will explain the poweful OSINT application called Maltego, and how you can leverage it in collecting open source data on your victim.
Curated Video
Introduction to Metasploit
In this video, you will learn the building blocks and the basics of the powerful Metasploit framework, developed by Rapid7. Use Metasploit ethically !!!
Curated Video
What is the definition of management?
This video provides an easy-to-understand definition of management and its importance in everyday life and organizations. Using relatable examples, it explains how management involves utilizing resources like time, people, and machines...
Curated Video
Execute Man-in-the-Middle Attacks
Learn how to execute MITM attacks using Ettercap tool, a very powerful application in Kali
Curated Video
Perform a DNS Spoofing Attack
This video will teach you how to perform a DNS spoofing attack, and how to take user's URL request to a crafted web application of your own
Curated Video
How to Exploit Vulnerabilities
Vulnerabilities are weaknesses in a computer system that reduce its overall security. Vulnerabilities might be flaws in the hardware itself or the software that uses it.
Curated Video
Cyber Kill Chain
Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in...
Curated Video
NMAP and ZENMAP Simplified
ZENMAP is the GUI version of NMAP, you will learn how to use both applications
Curated Video
Introducing NMAP
NMAP is the classic network scanner, in this video we will deep dive into its features
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Adding a Slideshow with the Bootstrap Carousel Component
This video explains how to add a slideshow with the Bootstrap carousel component. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and...
Curated Video
The Dam Busters (2009)
National Archives: ‘The Dam Busters’ tells the story of 617 Squadron and its daring and extremely difficult mission, which went on to become one of the most famous episodes of the Second World War. This videocast is part of the War on...
Curated Video
Structural Design Patterns in Modern C++ - Introduction to the Adapter Pattern
This video provides an introduction to the adapter pattern. This clip is from the chapter "Adapter Design Pattern" of the series "Structural Design Patterns in Modern C++".This section provides an introduction to the adapter design...
Curated Video
Structural Design Patterns in Modern C++ - Basic Example - Adapter Design Pattern
This video presents a basic example of the adapter pattern. This clip is from the chapter "Adapter Design Pattern" of the series "Structural Design Patterns in Modern C++".This section provides an introduction to the adapter design...
Curated Video
Structural Design Patterns in Modern C++ - Pros and Cons - Adapter Design Pattern
This video focuses on the pros and cons of the adapter pattern. This clip is from the chapter "Adapter Design Pattern" of the series "Structural Design Patterns in Modern C++".This section provides an introduction to the adapter design...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Adding and Collapsing Elements Using Bootstrap
This video demonstrates how to add and collapse elements using bootstrap. This clip is from the chapter "Exploring Rapid Web Design with the Bootstrap 4 Frontend Framework" of the series "Modern Web Design with HTML5, CSS3, and...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Creating Forms with HTML tags
This video demonstrates how to create forms with HTML tags. This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create web...